security attack
Recently Published Documents


TOTAL DOCUMENTS

106
(FIVE YEARS 38)

H-INDEX

9
(FIVE YEARS 4)

Author(s):  
Spriha Pandey* ◽  
Ashawani Kumar

Cognitive radio has proved to be an efficient and promising technology for the future of wireless networks. Its major and fundamental aim is to utilize the spectrum bands which are not efficiently exercised. These bands can be accessed using Opportunistic Spectrum Access (OSA), by a secondary user only when primary user is not transmitting over the channel. Cognitive radio manages spectrum through its cognitive radio cycle, which performs a set of management functions such as, spectrum sensing, spectrum assignment, spectrum sharing and spectrum mobility/handoff. During this cycle, at several stages, cognitive radio is very much vulnerable to security attacks. This is also due to the exposed nature of cognitive radio architecture. One such security attack which has not been much explored and can cause serious security issues is Cognitive User Emulation Attack (CUEA). This attack is expected to occur at the time of spectrum handoff. In this article the reason of occurrence of CUEA is explained along with counter measures to prevent this threat in the network by implementing trust mechanism using fuzzy logic. The proposed system is simulated and analyzed using MATLAB tool.


2021 ◽  
pp. 407-428
Author(s):  
Shubha R. Shetty ◽  
D. H. Manjaiah

2021 ◽  
Vol 9 (1) ◽  
pp. 1164-1173
Author(s):  
Dr. A. Thomas Paul Roy, Dr. N. Dhanalakshmi, Dr. D. Suresh

The DDoS attack is the most well-known network security attack for network and internet improvement. This paper mentions the DDoS Attack Precept and analyzes some methods of DDoS Attack. Applied sciences consisting of network visitor detection and packet content detection are presented in the DoS attack detection. It adds DDoS, which is mainly based on DoS, and describes certain DDoS tools and discusses the vital TCP flood DoS assault concept. The DoS Attack software and the DoS Assault Detection software are primarily scanned based on Winpcap and the community package and take-over technology are implemented. The test showed the key development of DoS attack and element detection.


Author(s):  
Rachmad Fitriyanto

Security information method for jpeg / exif documents generally aims to prevent security attack by protecting documents with password and watermark. Both methods cannot used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that used to represent data integrity. This study aims to compile a message digest to detect changes that occur in jpeg / exif documents in information security. The research phase consists of five stages. The first stage, identification of the jpeg / exif document structure conducted using Boyer-Moore string matching algorithm to find jpeg/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, jpeg / exif document modification experiments to identified affected segments. The Fifth stage is selecting and combining the hash value of the segment into message digest. Obtained result show message digest for jpeg / exif documents composed of two parts, the hash value of the SOI segment and the APP1 segment. The SOI segment value used to detect modifications for jpeg to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing.


Syntax Idea ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 1
Author(s):  
Agus Permana

The purpose of this paper is to analyze and describe the strategy of the Indonesian government in mitigating the risk of dealing the threat of cyber warfare. This paper uses the qualitative method using 3 indicators of risk mitigation theory consisting of prevention, indentification and remedy to interpret the problem and explain it in more detail by collecting data from literature studies. Cyber defense threat mitigation refers to policies and processes put in place by an institution to help in preventing a potential security incident and data breaches as well as to limit the extent of damage when a security attack does happen. The results of the discussion of this study are the Indonesian government's strategy focusing on processes, technology and information, preparedness, response, and follow-up activities, all of which included in instruments for measuring risk mitigation of cyber warfare threats. The conclusion is that Cyber defense in the form of a strategic concept must be concrete if all infrastructure networks are held, then the cyber defense policy can be known. To build a reliable cyber defense system, the government and stakeholders must ensure that the cyberinfrastructure is secure.  The Indonesian government must increase capacity and increase cooperation leading stakeholders and government is essential regarding cyber warfare. Having a good risk mitigation plan will help cyber defense policies in Indonesia as the basis for the preparation.


Author(s):  
Ankit Kumar Jain ◽  
B. B. Gupta

Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due to the massive growth of mobile users. The smishing message is very harmful since its target to financial benefits. In this article, the authors present a new feature-based approach to detect smishing messages in the mobile environment. This approach offers ten novel features that distinguish the fake messages from the ham messages. In this article, the authors have also identified the nineteen most suspicious keywords, which are used by the attacker to lure victims. This article has implemented these features on benchmarked dataset and applied numerous classification algorithms to judge the performance of the proposed approach. Experimental outcomes indicate that proposed approach can detect smishing messages with the 94.20% true positive rate and 98.74% overall accuracy. Furthermore, the proposed approach is very efficient for the detection of the zero hour attack.


2021 ◽  
Vol 1750 ◽  
pp. 012071
Author(s):  
Rui Wang ◽  
Qiujing Gong ◽  
Ke Zhen ◽  
Xing Zhe Hou ◽  
Min He ◽  
...  

Author(s):  
Christos Xenofontos ◽  
Ioannis Zografopoulos ◽  
Charalambos Konstantinou ◽  
Alireza Jolfaei ◽  
Muhammad Khurram Khan ◽  
...  

2020 ◽  
Vol 15 (6) ◽  
pp. 1698-1706
Author(s):  
Damla Karagozlu

As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study is to determine the behaviours of pre-service teachers as this study’s objective is to determine the behaviours of pre-service teachers regarding cyber security. This study is designed according to the quantitative research method and the Personal Cyber Security Ensuring Scale has been used. 144 pre-service teachers of two different universities who took up instructional technologies and material design courses in the 2019–2020 spring semester participated in the study. It has been observed that the participants frequently took measures when they noticed unreliable people and situations in the internet environment but took occasional measures in terms of not leaving any trace, taking precautions and protecting personal privacy.   Keywords: Cyber attack, cyber security, personal cyber security, pre-service teachers


Sign in / Sign up

Export Citation Format

Share Document